Skip to main content

Security devicesLaajuus (5 cr)

Code: KT00FE06

Credits

5 op

Responsible person

  • Kimmo Kääriäinen

Objective

You are able to implement effective information security solutions using various security devices.
You are able to implement technical information security controls based on information security policies.
You are able to design and implement virtual private networks.
You are able to identify and combat various threats posed on data networks and end points.

Content

How are information security solutions implemented with different security devices?
How are technical information security controls derived from information security policies?
How are virtual private networks designed and implemented?
How do you identify and prepare for various threats targeted at information networks?